Dustin Ray's repositories
CAPY-pqARK
Framework for recursively arguing the integrity of an unlimited size computation in a constant-sized proof
bread-recipes
bread recipes
computation-graph
A framework for constructing arithmetic circuits on-the-fly.
tiny-ed448-goldilocks
A lean, high performance, pure rust implementation of Ed448-Goldilocks for easy signatures and key exchange.
crypto-bigint
Cryptography-oriented big integer library with constant-time, stack-allocated (no_std-friendly) implementations of modern formulas
Differentially-Private-DGA-Detection
Produces a differentially-private model for domain generation algorithm detection.
Extended-Euclidian-Algorithm
A simple implementation of the extended Euclidian algorithm in OCAML to emphasize the elegance of functional programming languages.
CAPY2vML-Bonsai
Bonsai relay interacts with Solidity contract to produce a differentially-private machine learning prediction.
ZK-STARK-Prover
Prove in quantum-resistant zero-knowledge that you know the square of the nth fibonacci number.
capyCUBIT
An enhanced math library for the Cairo language supporting additive noise mechanisms for private machine learning applications.
capyCRYPT-go
A complete desktop cryptosystem based on SHA3 and the E521 elliptic curve for message exchange and authentication
ModInv
An elegant OCAML modular multiplcative inverse calculator.
secp256r1_ecdsa
Compares (Weierstrass + SHA256) to (Edwards + SHA3)
TLS-Python
A simple python HTTPS proxy that demonstrates delivery of malicious payload to victim of MITM attack
Defensive-Coding-Practice
A program to demonstrate various methods of safely accepting and processing user input.
Eggshell-Buffer-Overflow
Demonstrates effects of unsafe C functions by injecting a payload containing machine code to spawn a shell into a vulnerable function.
TotallyNotAWorm
Self compiling and self executing java program. Totally legit.
KECCAK-Rust
A translation of the the compact KECCAK algorithm into the Rust programming language.
ElGamal-Signature---Python
A python implementation of the El Gamal signature scheme.
Authenticated-Message-exchange-tool
A tool to encrypt an arbitrary message using AES in CTR mode. Authentication of the message is provided via the SHA256 hash function. A time stamp is added to each message file to mitigate replay attacks
salsa-20
A simple python implementation of salsa 20